Senior Global Network Exploitation and Vulnerability Analyst (Finance)
Senior Global Network Exploitation and Vulnerability Analyst (Finance) Overview Two Six Technologies is seeking a Senior Global Network Exploitation and Vulnerability Analyst Responsibilities We are researching large scale solutions to emulate large scale networking systems in our own virtualization cluster to test IoT security. If problem solving and creating novel solutions for all aspects of internet scale vulnerability assessment, exploitation, and implant orchestration is appealing to you, we would love to talk to you. Qualifications A strong foundational knowledge of computer science or systems engineering In depth experience with Linux systems, including on embedded devices and with legacy versions Experience with virtualization technologies such as VMWare, Linux KVM, Xen, QEmu A background in existing exploitation frameworks such as metasploit Penetration testing and/or exploitation campaign management experience Solid understanding of networking concepts including all levels of the OSI Model Experience with network analysis tools such as wireshark Understanding of internet-scale networking concepts including recursive DNS and BGP. Desire to perform cutting edge research on security ramifications of the Internet of Things. A bachelor's degree in Computer Science, Computer/Electrical Engineering, or related Scientific Domain Strong oral and written communication skills Ability to program (python highly desired) Ability to write shell scripts and navigate your way around bash/busybox Ability to analyze IoT device firmware Ability to emulate an embedded devices in firmadyne/qemu Must be able to work independently and as part of a team Nice to haves: An advanced degree (Masters or Ph D.) in Computer Science, Computer/Electrical Engineering, or related Scientific Domain Experience with internet scale infrastructure Experience with modern botnets and techniques Experience with cybersecurity test ranges Experience with level 2 and level 3 of OSI model Hacking experience on IoT products Experience with running penetration tests or exploitation campaigns Experience with exploitation or implantation frameworks Experience with C2 An active DoD security clearance Two Six Technologies is an Equal Opportunity Employer . All qualified applicants will receive consideration for employment at Two Six Technologies without regard to race, color, religion, national origin, sex, age, physical and mental disability, sexual orientation, gender identity or expression, genetic information, veteran, marital, pregnancy or citizenship status; or any other status prohibited by applicable national, federal, state or local law. If you are interested in applying for employment with Two Six Technologies and require an accommodation, please contact Human Resources at Two Six Technologies by calling 703- - or sending an email to @twosixtech.com . Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.